Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS5475378 A
Publication typeGrant
Application numberUS 08/080,616
Publication dateDec 12, 1995
Filing dateJun 22, 1993
Priority dateJun 22, 1993
Fee statusPaid
Also published asCA2098973A1
Publication number080616, 08080616, US 5475378 A, US 5475378A, US-A-5475378, US5475378 A, US5475378A
InventorsEnn Kaarsoo, Bill Charlton
Original AssigneeCanada Post Corporation
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Electronic access control mail box system
US 5475378 A
Abstract
An electronic access control mailbox system comprises a plurality of mail box stations. Each station consists of a locker of mail box compartments each having a door with electrically controllable solenoid operated latch, a card reader, and a local controller electrically coupled to the solenoid of each compartment door. A central controller is in electrical communication with the card reader and the local controller of each mail box station. Identification data read at the card reader of each mail box station is communicated to the central controller for processing and the central controller in turn communicates a command to the local controller for controlling operation of the solenoid operated latches of each compartment door in response to the identification data road. The system offers secure electronic access to the mail boxes which are under centralized control and monitoring.
Images(2)
Previous page
Next page
Claims(1)
The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. An electronic access control mail box system comprising a plurality of mail box stations, each said station including:
an array of mail box compartments each having a door provided with electrically controllable locking means,
a card reader adapted to read identification data from an identification card,
a plurality of electrical switch means connected respectively to each locking means for causing unlocking of the locking means, and
a local control unit having a data base containing valid identification data, an input electrically connected to the card reader and a plurality of parallel outputs respectively connected to the switch means, the local control unit receiving identification data from the card reader;
and a remote central control unit in electrical communication with the card readers and local control units of all the mail box stations, the remote central control unit having a central data base containing valid identification data for all the mail box stations and having means for monitoring operations at the mail box stations and updating all the data bases including the central data base,
whereby, in on-line operation, identification data received from a card reader is compared with data in the central data base to determine a mail box compartment of the array for which access is valid for the received identification data to generate a command that is communicated from the central control unit to the local control unit associated with the card reader to thereby energize an associate switch means and unlock an associated locking means, and whereby, in off-line operation, identification data received from a card reader is compared with data in the data base of the associated local control unit to determine a mail box compartment of the array for which access is valid for the received identification data to thereby energize an associated switch means and unlock an associated locking means.
Description

This invention relates to a mail box system having access thereto under electronic control, and in particular to card controlled access for a distributed mail box system.

BACKGROUND OF THE INVENTION

Delivery systems for secure distribution of printed material utilizing stations of lockable compartments are well known. A conventional delivery station comprises an array of compartments, such as mail boxes, each having a compartment door which includes a lockable latch. Access to a compartment through its respective door is restricted to persons who possess a key capable of operating the latch lock. Such mail box delivery stations are commonly found in many areas distributed throughout a typical multi-floor office building.

U.S. Pat. No. 4,698,630, entitled "Security System", issued on Oct. 6, 1987 to American Locker Group Incorporated which is hereby incorporated by reference, discloses a secure locker system wherein access to individual compartments within the locker's array of compartments is under electronic control and effected through entry of a multiple digit user code at a keyboard console. Each compartment door includes an addressing logic circuit controlling a solenoid operated locking mechanism and the logic circuits of all the compartments are connected in parallel to the console. A user access code entered at the console, which in effect represents the "key" to unlocking specific compartments, is processed and converted to a locker address value which then is considered by each logic circuit to determine if its respective compartment door should be unlocked.

This delivery system however suffers from the disadvantage of having a user recall his or her access code. Also, each locker compartment includes an addressing logic circuit which increases the cost and complexity of the overall construction of the locker, and it is necessary to manually set address identification data at each individual compartment of the locker. Furthermore, the American Locker Group Incorporated security locker is a stand alone unit and in the case where several of these lockers are in use within an office builiding, each locker must be updated separately, for example, when a new access code is to be programmed.

SUMMARY OF THE INVENTION

It is an object of the invention to provide a new and improved electronic access control mail box system.

In accordance with a first broadest aspect of the invention, there is provided an electronic access control mail box system comprising: one or more mail boxes, each of which consists of a compartment with a door having electrically controllable locking means, a card reader for reading identification data, and control means electrically coupled to the card reader and the locking means of each compartment door for controlling operation of the locking means in response to identification data read.

According to a second broad aspect of the invention, there is provided on electronic access control mail box system comprising: a plurality of mail box stations, each of which comprises an array of one or more mail box compartments each having a door with electrically controllable locking means, a card reader for reading identification data, and local control means electrically coupled to the locking means of each compartment door for controlling operation of the locking means; and central control means in electrical communication with the card reader and the local control means of each mail box station, whereby identification data road at the card reader of each mail box station is communicated to the central control means for processing and the central control means in turn communicates a command to the local control means for controlling operation of the locking means of the compartment doors in response to the identification data read.

The electronic access control mail box system is advantageous in that its configuration may be readily adapted for varying size requirements; mail box stations may be distributed over a wide area while having centralized control and monitoring of each station within the system. Persons wishing access to a mail box or boxes of a station simply pass an identification card, such as an employee badge, through a card reader at the station. Access requests or alarm events that occur at the stations are logged and may be reported to an operator at the central controller for further handling, if necessary. In the event that centralized control fails, each mail box station may be controlled locally.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be further understood from the following description of a preferred embodiment of the electronic access control mail box system with reference to the accompanying drawings in which:

FIG. 1 is a schematic of mail box station having access thereto electronic control; and

FIG. 2 is a topography of a distributed mail box system incorporating a plurality of the stations of FIG. 1.

Similar reference numerals are used in different figures to denote similar components.

DETAILED DESCRIPTION

Referring to FIG. 1, illustrated is a mail box station 10 which includes electronic access control means and upon which a distributed mail box system is based the mail box station 10 consists of a mail box locker 12 electrically coupled to a local control unit 14 to which a card reader 16 is connected. The card reader 16 would normally be physically located on a wall near the mail box locker 12.

The locker 12 is a conventional arrangement formed, in this particular instance, of an array of sixteen mail box compartments 18, each having a door with an electrically operable locking mechanism such as the solenoid controlled latch described in U.S. Pat. No. 4,698,630. Application of a low voltage signal or pulse to energize the solenoid results in movement of the latch to an unlocked position, and subsequent removal of the energizing signal returns the latch to a locked position.

The control unit 14 is a microprocessor based device with its own local memory and its utilized to process both digital inputs and outputs for alarm monitoring purposes and peripheral device control purposes, respectively. One such control unit is the Matrix MS-534-16 Distributed Processing Unit marketed by Honeywell Protection Services. The digital outputs provided are for peripheral control purposes, such as camera control, lighting control or local alarm generation. The digital inputs accept various alarm signal sources (e.g. motion detectors) and are typically supervised inputs to ensure that any attempt to compromise an alarm input will be detected and logged in a manner to be described latter.

The control unit 14 includes a set of sixteen output relays, each of which is connected through separate electrical conductors to the solenoid operated locking mechanisms of each of the sixteen mail box compartments 18 at the locker 12. The relays control application of the low voltage signal needed to energize the solenoids, thereby effecting control over locking and unlocking of each mailbox compartment. The control unit 14 further contains its own integral power supply, as well as a battery back-up which may be used by the control unit 14 to supply DC power to itself and to the card reader 16, motion detectors and any other devices in the event that the AC supply should fail.

A communication bus 20 couples the control unit 14 which is local with respect to the mail box station 10 to a central control unit (shown in FIG. 2 generally denoted with 22), as will be discussed later. Over communication bus 20, the control unit 14 reports status information to the central control unit and receives commands for execution from the central control unit. Additionally, the microprocessor based control unit 14 is capable of making local decisions in the event that there is a loss of communication between the control unit 14 and the central control unit and thus the mail box station 10 can continue to operate with a loss of only a few features which are dependent on the central control unit.

The card reader 16 is also a microprocessor based unit incorporating a card slot, a keypad, a LCD display, and control inputs and outputs. The Matrix MX1 Intelligent Badge Reader marketed by Honeywell Protection Services is an example of such a card reader unit and includes thirty-two Kbytes of EEPROM memory plus a real time clock calender. The reader technology is based on the use of a magnetic stripe access card and offers a lockout feature which locks the reader so that a user cannot unlock a door until the lockout status is released. The card reader 16 is connected to the control unit 14 through bussed terminal strips 28 and to the central control unit over communication bus 20.

Turning now to FIG. 2, illustrated is a topography of a distributed mail box network formed from a plurality of mail box stations 10 which are located on various floors throughout a office complex consisting of two towers and which stations communicate with a central control unit 22 over the communication bus 20.

The central control unit 22 comprises a computer workstation 24 having a processor unit, keyboard and VGA colour monitor, and a data logger printer 26. The central control unit 22 provides for the overall control and complete operation of the mail box system. The computer workstation 24 decides, in conjunction with any operator input that may be required, what actions are to be executed by the local control unit 14 and card reader 16 at each mail box station 10.

The communication bus 20 may be implemented as a RS-422 multi-drop loop configuration and combines the individual card readers 16 and control units of all stations 10 into a single unified, centrally controlled system.

The workstation 24 uses the communication bus 20 to coordinate the operation of all the card readers 16 and local control units 14, which entails such functions as the downloading of databases and the sending of commands from the central control unit 22 to the card readers 16 and the control units 14, and the receiving of reports from the card readers 16 and the control units 14. Also, the workstation 24 is capable of uploading data, such as the databases and event reports logged, to other computer processing facilities usually for analysis purposes.

The previous discussion concerned hardware utilized in the distributed mail box system (hereinafter referred to as "system"). The following is a general description of the main access control and alarm monitoring features of the system.

The system is operated from the central control unit 22 and in particular at workstation 24. The operator interacts with the system via the monitor and keyboard of the computer workstation 24, through which the operator may perform the following functions: acknowledgement of an alarm; manual granting of access; generation of report; updating of the database, e.g., access schedules, automatic schedules, card validation for the site, action plans, etc; and disabling of points, shunting of zones, etc.

The performance of the above functions is restricted to an operator with the appropriate authorization level. For instance, there may be eight predefined authorization levels and each system function requires an authorization level to perform it. Any operator with an authorization level equal to or exceeding the authorization level of the function is permitted to perform that function. Thus the authorization levels form a hierarchy with each level containing execution privileges to the functions in its level as well as to functions in all the lower levels. This approach provides for a more secure system by restricting the more security sensitive functions to the higher authorization levels.

Operator access to the system may be made more secure through the use of passwords. This access procedure provides a very high level of protection against unauthorized access to the system.

The operator has full control over the system from the workstation 24 in the central control unit 22. All devices in the system can be monitored and the complete status of the system is available at all times. Furthermore, this information is displayed in a format that permits the operator to assimilate the information quickly, and thus respond quickly.

The system features graphics and textual display. The graphic display is utilized to provide a floor plan with Icons to identify alarm points and their status. Thus the operator can immediately identify the location of an alarm. These floor plans are entered into the system and configured by the operator. The operator is provided with full control over the graphic information being displayed. The textual display can also be utilized to provide the operator with a great variety of other information e.g. action plans, access schedules, alarm point identification, etc.

The system also features an unattended mode of operation. In this mode of operation, alarms are queued to await an operator response. The system has a feature whereby it can signal an external device such as a radio pager, which can summon an operator or another authorized individual to respond to the alarm.

The operator normally handles each alarm detected and no alarms are lost by the system. The alarm generation sequence is as follows.

First a change of state occurs somewhere in the system. This change of state is detected by a card reader 16 or local control unit 14 associated with one of the mailbox stations 10, which then informs the computer workstation 24 in the central control unit 22 of the change of status via the communication bus 20. This process of detecting the change of state and transmitting it to the workstation 24 in the central control unit 22 is done very quickly, due to the high speed local microprocessors in the card readers 16 and the control units 14, the high data rate of the communication bus 20, and the utilization of a communication protocol with very low overhead. The received status change is then processed by the computer workstation 24.

The computer workstation 24 processing consists of first logging the event, (i.e. change of status), in its hard disk and to the printer 26 and then determines the appropriate action to take. This action may be to classify the change of status as an alarm and notify the operator or determining that the status change is not an alarm and requires no further action on the part of the system. The system is also capable of performing other actions in response to this status change such as the changing of the state of a digital output to control a camera or other peripheral equipment. The action that the system takes can also depend on automatic time-of-day schedules in the system.

In the event that there is a central control unit 22 failure or a communication bus 20 failure, the card readers 16 and control units 14 will store the events local to their specific station 10 and transmit them when the failure has been rectified. These events will be identified as ones which were archived by the card readers 16 and control units 14, and will receive appropriate processing by the computer workstation 24 of the central control unit 22. This feature ensures that the system can recover in an orderly manner from a failure.

In the case of multiple alarms, the system stores the alarms in a priority ranked queue, thus permitting the most urgent alarms to be processed first. There may, for example, be ten alarm priority levels in the system.

The system incorporates a high level access management system that typically allows for two hundred individual time-of-day schedules, two hundred card reader time-of-day schedules, and two hundred alarm shunt time-of day schedules, plus card reader access codes and individual user access codes. Other access control features such as local/center anti-passback (for one entry/exit zone), and central anti-passback for zones or regions with more than one entry/exit are also included in the system.

Anti-passback is accomplished with a status flag associated with each card holder. Two readers are required in order to perform anti-passback, an entry and an exit reader.

Each time a card is presented at a reader, the system checks if it is an entry or an exit. As an example, if it is an exit reader, then the system checks the status of the anti-passback flag to see if the card holder is IN or OUT. If the flag is IN, then the egress will be granted, otherwise, it will be denied. If the egress was granted, the status flag will toggle (e.g. before the transaction, the status was IN, after the transaction, the status will be OUT).

It is the same process when the card is presented at an entry reader, but the status flag would toggle in the opposite way.

In on-line mode, access control transactions are routed to the workstation 24 via the associated card reader 16 for card validation and global anti-passback checking. In the vent of a communication failure between the workstation 24 and the card reader 16, the local database of the card reader 16 provides the information that permits local decisions to be made without accessing the computer workstation 24. Local anti-passback is possible only on a Master/Slave card reader 16 configuration basis.

Another feature is the Personal Identification Number (PIN). The PIN number is used to verify that it is the card owner who is making the access request. All requests for access are processed by the computer workstation 24 in the central control unit 22. This ensures that the system is able to provide a very tight central control over the entire system. Local decisions by the card reader 16 to grant access are only made in the case of the central control unit 22 or communication bus 20 failure. In the event of such a failure, the card reader 16 utilizes its local database to make the decision as to whether or not to grant access.

Once a user has entered the access card to a card reader 16 and has entered his or her PIN, it should take less than one second to inform the user of acceptance or rejection of the request for access. To exit a secure zone, the user is required to use their card if the zone is one with the anti-passback feature.

Event logging in the system has been implemented to ensure the correct logging of all events in the system. Events are logged to the printer and the hard disk of the central control unit 22. Event logging provides a complete record of what has occurred in the system.

Operator actions are also logged by the system, thus ensuring that all proper actions have been taken in the handling of alarms.

The system is capable of providing a variety of reports that cover the complete operation of the system and facilitate the efficient management of the system. The following reports may be generated: an alarm report to indicate points currently in alarm; a trouble report to list all digital points currently in hardware error; an event report to show the status of points at a certain data and time; a roster report to show all the card holders who have access privileges at a particular card reader; and an event report to provide a history of the acceptance and rejection of cards at an card reader.

The system maintains both a host database in the central control unit 22 and a local database in each of the mail box stations 10.

The database on the computer workstation 24 of the central control unit 22 is the master or host database for the system and is utilized for processing access requests while the system is in on-line operation. All the data in the local databases of the card readers 16 and control units 14 are verified against this master database. This centralization of the database ensures that the system will operate consistently. The system automatically ensures that all databases in the system are consistently under operator control. Any modification to the central database is automatically made under operator control to the concerned local databases of the card readers 16 and the control units 14.

Through the interface provided by the workstation 24, the databases are easily adaptable to changing requirements. All editing and updating of the databases can be done while the system is on-line without the loss of any of the alarms.

A local database is used by the card readers 16 and control units 14 in each mail box station 10 in the event that it is not possible to communicate with the computer workstation 24 of the central control unit 22, specifically referred to as off-line operation. This database provides the information that permits local decisions to be made. This capability allows the system to continue to operate without any access to the host's database.

Each local database is maintained by the system under operator control by a download procedure initiated at the workstation 24.

In use, a person wishing access to a particular box or boxes of a mail box station 10 would pass his or her magnetic striped card, such as an employee identification badge, at the card reader 16 of that station 10. Identification data encoded in a magnetic stripe on the employee badge is read by the card reader 16 and then either processed locally at the mail box station 10 or centrally by the computer workstation 24 depending on whether the system is in off-line or on-line operation, respectively. Processing involves verifying the identification data and the time of day the access request is made against access code and time schedule information stored in the local or central databases. For higher security zones, the card holder making the request is required to enter his or her PIN number to verify that it is the card owner who is making the access request. On confirming that access should be granted, the card reader 16 or workstation 24 enables all valid mail box doors to be opened on the mail box locker 12 by issuing a command to the control unit 14 which will operate the appropriate relays to supply a low voltage signal to the solenoids of the valid mail boxes, thereby unlocking the doors.

All access requests made at an card reader 16 will be logged on the hard disk and the printer as regular access transactions. Reports may then be generated from the recorded data.

In a variant of the mail box system, contact switches may be incorporated between the door and compartment of each mail box in a locker in order to monitor the status of each door. The contact switches would be coupled to the alarm inputs of the control unit. Any attempt to manually pry open a mail box door or through inadvertence a door being left open will be detected and logged as an event by the system to be handled by an operator. Furthermore, the mail box system may be connected as a sub-system to a host computer, such as the security system of an office complex, which would provide two units for controlling and monitoring the mail box system.

The foregoing description has been limited to specific embodiments of the invention. It will be apparent, however, that variations and modifications may be made to the invention, with the attainment of some or all of the advantages of the invention. Therefore, it is the purpose of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4644104 *Apr 7, 1986Feb 17, 1987William MiddlemissSecurity system including a plurality of centrally programmable locking assemblies
US5120939 *Nov 9, 1989Jun 9, 1992At&T Bell LaboratoriesDatabaseless security system
US5264685 *Jun 9, 1989Nov 23, 1993Schulte-Schlagbaum AktiengesellschaftCoding device for magnetic cards
US5329250 *Feb 11, 1993Jul 12, 1994Sanyo Electric Co., Ltd.Double phase locked loop circuit
US5345379 *Jun 17, 1991Sep 6, 1994Brous James HSystem for controlling access to subsystems
US5392025 *Sep 24, 1993Feb 21, 1995Intermark CorporationElectronic security system for display cabinets
CA1254287A1 *Apr 4, 1986May 16, 1989American Locker Group IncorporatedSecurity system
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US5946660 *Jan 8, 1997Aug 31, 1999Chas-Tech, Inc.Automated storage system
US6010064 *Jul 1, 1997Jan 4, 2000Alpha Corp.Commodity distributing locker apparatus
US6116506 *Apr 29, 1996Sep 12, 2000Hitachi, Ltd.Transaction-oriented electronic accommodation system
US6230971Jun 15, 2000May 15, 2001Hitachi, Ltd.Transaction-oriented electronic accommodation system
US6233588Dec 2, 1998May 15, 2001Lenel Systems International, Inc.System for security access control in multiple regions
US6374356Jun 23, 1998Apr 16, 2002Axs Technologies, Inc.Shared intelligence automated access control system
US6457879 *Dec 17, 1997Oct 1, 2002Microsoft CorporationMethod for continouously processing electronic messages throughout a transition between online and offline states
US6542075Jan 16, 2001Apr 1, 2003Vigilos, Inc.System and method for providing configurable security monitoring utilizing an integrated information portal
US6564998Jan 25, 2000May 20, 2003Hewlett-Packard Development CompanyCard enabled latch for a portable computer
US6685284 *Feb 22, 2001Feb 3, 2004Kabushiki Kaisha Fulltime SystemUnlock system of particular locker
US6715669 *Mar 16, 2001Apr 6, 2004Kabushiki Kaisha Fulltime SystemDelivery box capable of handling registered mails
US6715682 *Jul 6, 2001Apr 6, 2004Kabushiki Kaisha Fulltime SystemDelivered article receiving locker cabinet
US6738772Aug 18, 1998May 18, 2004Lenel Systems International, Inc.Access control system having automatic download and distribution of security information
US6748343Sep 28, 2001Jun 8, 2004Vigilos, Inc.Method and process for configuring a premises for monitoring
US6769611 *May 25, 2001Aug 3, 2004Michael Robert MillerMethod and apparatus for the secure delivery of goods
US6791450Jul 31, 2001Sep 14, 2004Security People, Inc.Networked digital locker lock system
US6820805Jun 4, 2001Nov 23, 2004Ebox Usa Inc.Computerized recording and notification of the delivery and pickup of retail goods
US6834797 *Dec 21, 2001Dec 28, 2004Koninklijke Philips Electronics N.V.Pocket
US6839731May 20, 2003Jan 4, 2005Vigilos, Inc.System and method for providing data communication in a device network
US6845909Mar 28, 2003Jan 25, 2005United Parcel Service Of America, Inc.Systems and methods of inventory management utilizing unattended facilities
US6866195Oct 31, 2002Mar 15, 2005United Parcel Service Of America, Inc.Systems and methods of inventory management utilizing unattended facilities
US6879243Feb 14, 2002Apr 12, 2005Penco Products, Inc.Electronically-controlled locker system
US6882269 *Jul 12, 2001Apr 19, 2005Darren MurreySystem and method for remotely coordinating the secure delivery of goods
US6917902Feb 28, 2003Jul 12, 2005Vigilos, Inc.System and method for processing monitoring data using data profiles
US6954782Aug 19, 2002Oct 11, 2005Microsoft CorporationMethod for continuously processing electronic messages throughout a transition between online and offline states
US6961711 *Sep 12, 2000Nov 1, 2005Fong Fatt CheeMethod and system for facilitating delivery and pickup of goods
US6999825 *Dec 21, 2001Feb 14, 2006Nec CorporationLocker system, locker controlling method, control center, and recording medium
US7016813Apr 6, 2004Mar 21, 2006Vigilos, Inc.Method and process for configuring a premises for monitoring
US7055741Dec 20, 2004Jun 6, 2006United Parcel Service Of America, Inc.Systems and methods of inventory management utilizing unattended facilities
US7093753 *Nov 9, 2004Aug 22, 2006Koninklijke Philips Electronics N.V.Pocket
US7118033Jun 16, 2004Oct 10, 2006Scm Microsystems, Inc.Access system
US7123147 *May 7, 2004Oct 17, 2006Engel Raymond CElectronic mailbox with electronically programmed access door to remove mail, with separate mail delivery slot configured to prevent access to mail box, and with auxiliary backup power system
US7242290Sep 10, 2004Jul 10, 2007Visible Assets, Inc.Testing methods for use with boxes
US7249705Oct 26, 2005Jul 31, 2007Joseph DudleyTheft preventative mailbox having remote unlocking activation mechanism
US7254640Apr 9, 2003Aug 7, 2007Vigilos, Inc.System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure
US7310569 *Apr 8, 2004Dec 18, 2007Deutsche Post AgMethod for controlling electronic parcel compartment systems
US7323967Jan 21, 2005Jan 29, 2008Penco Products, Inc.Electronically-controlled locker system
US7348874Apr 8, 2004Mar 25, 2008Deutsche Post AgPacket box electronic device and logistic system
US7370074Dec 6, 2001May 6, 2008Vigilos, Inc.System and method for implementing open-protocol remote device control
US7382226Mar 13, 2002Jun 3, 2008Mr Eletronic SaDevice for limiting access to a confined space
US7477132Apr 8, 2004Jan 13, 2009Deutsche Post AgElectronic device for packet boxes and related operating method
US7480715Jan 24, 2003Jan 20, 2009Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US7606843Feb 28, 2003Oct 20, 2009Vigilos, Inc.System and method for customizing the storage and management of device data in a networked environment
US7627665Apr 3, 2001Dec 1, 2009Barker Geoffrey TSystem and method for providing configurable security monitoring utilizing an integrated information system
US7653945Feb 22, 2006Jan 26, 2010Shield Security Systems, L.L.C.Interactive key control system and method of managing access to secured locations
US7742928May 9, 2003Jun 22, 2010United Parcel Service Of America, Inc.System for resolving distressed shipments
US7933989Jan 8, 2009Apr 26, 2011Barker Geoffrey TPredictive threat assessment
US7944469Feb 14, 2006May 17, 2011Vigilos, LlcSystem and method for using self-learning rules to enable adaptive security monitoring
US7969285 *Sep 19, 2006Jun 28, 2011International Business Machines CorporationManagement of badge access to different zones
US8239347Sep 10, 2009Aug 7, 2012Vigilos, LlcSystem and method for customizing the storage and management of device data in a networked environment
US8239481Mar 24, 2008Aug 7, 2012Vigilos, LlcSystem and method for implementing open-control remote device control
US8249998May 12, 2010Aug 21, 2012United Parcel Service Of America, Inc.System for resolving distressed shipments
US8362876Apr 8, 2010Jan 29, 2013Merten C WilliamInterlock system and method
US8392552Apr 3, 2002Mar 5, 2013Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US8700769Sep 14, 2012Apr 15, 2014Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US8749382 *Aug 2, 2010Jun 10, 2014Myspace LlcPortable security container
US20070018791 *Sep 27, 2006Jan 25, 2007Johnson Ronald LContainer with a selective opening and closing mechanism
US20090237219 *Mar 13, 2009Sep 24, 2009Berlin Bradley MSecurity apparatus, system and method of using same
US20110187530 *Aug 2, 2010Aug 4, 2011Myspace LlcPortable Security Container
USRE43598Mar 21, 2008Aug 21, 2012Vig Acquisitions Ltd., L.L.C.Method and process for configuring a premises for monitoring
USRE43933Aug 7, 2009Jan 15, 2013Hatoshi Investments Jp, LlcSystem for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure
DE19740113A1 *Sep 12, 1997Dec 10, 1998Jens ZschorlichVerfahren und Einrichtung zur Handhabung der Verteilung von flächigen Postsendungen
DE19740113C2 *Sep 12, 1997Sep 2, 1999ZschorlichVerfahren und Einrichtung zur Handhabung der Verteilung von flächigen Postsendungen
EP0821518A2 *Jul 24, 1997Jan 28, 1998S. Siedle & SöhneTransfer device and distribution device
EP1244069A1 *Mar 20, 2001Sep 25, 2002MR Electronic SADevice for limiting access to a confined space
EP2105890A2 *Mar 23, 2009Sep 30, 2009Noritsu Koki Co. Ltd.Delivery system
WO1997008668A1 *Aug 23, 1996Mar 6, 1997Peter S ConklinElectromagnetically managed latching exit bar
WO1999061730A1 *May 28, 1999Dec 2, 1999Slc Technologies IncRetrofit electrical blocker for mechanical lock
WO2000051750A1 *Mar 3, 2000Sep 8, 2000Chen JianSystem and method for secure time-shared electronic access parcel distribution
WO2001008107A1 *Jul 21, 2000Feb 1, 2001Mas Hamilton Group IncComputer software for issuing one-time combinations to electronic locks with lock group control
WO2001048641A1 *Dec 22, 2000Jul 5, 2001Chapman LyndaSecure delivery system
WO2002007021A2 *Jul 9, 2001Jan 24, 2002Bybox Holdings LtdSystem and method for facilitating receipt and collection of goods ordered from online retailers
WO2002075668A1Mar 13, 2002Sep 26, 2002Mr Electronic SaDevice for limiting access to a confined space
WO2002097605A1 *May 22, 2002Dec 5, 2002Gotfried Bradley LPackage receiving system and method
WO2003034162A2 *Oct 7, 2002Apr 24, 2003Christian BorgerPacket box electronic device and logistic system
WO2003056490A1Dec 23, 2002Jul 10, 2003Accenture Global Services GmbhDelivery of goods to electronic storage lockers
WO2003069566A2 *Feb 6, 2003Aug 21, 2003Digitech International IncElectronically-controlled locker system
WO2005001777A1 *Jun 16, 2004Jan 6, 2005Robert J Merkert SrAccess system
WO2006062535A2 *Mar 8, 2005Jun 15, 2006Christopher MoudySystem and method for delivery of goods ordered via the internet
WO2008033098A1 *May 23, 2007Mar 20, 2008Nanyang PolytechnicConfigurable system for electric device storing and tracking
Classifications
U.S. Classification340/5.6, 340/5.73, 235/382
International ClassificationA47G29/14, G07F7/00, G07F17/12, G07C9/00
Cooperative ClassificationG07F7/00, A47G29/141, G07F17/12, G07C9/00103
European ClassificationG07C9/00B8, G07F7/00, G07F17/12, A47G29/14E
Legal Events
DateCodeEventDescription
Mar 13, 2007FPAYFee payment
Year of fee payment: 12
Mar 6, 2003FPAYFee payment
Year of fee payment: 8
May 27, 1999FPAYFee payment
Year of fee payment: 4
Aug 20, 1993ASAssignment
Owner name: CANADA POST CORPORATION, CANADA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAARSOO, ENN;CHARLTON, BILL;REEL/FRAME:006679/0615
Effective date: 19930720